PatchSiren cyber security CVE debrief
CVE-2024-43483 Siemens CVE debrief
According to the supplied CISA/Siemens CSAF record, CVE-2024-43483 is a high-severity denial-of-service issue with a network attack vector, no privileges required, no user interaction, and impact limited to availability. The advisory maps the affected product to Siemens INTRALOG WMS and recommends updating to V5 or later. The CVE description itself names .NET, .NET Framework, and Visual Studio, so defenders should verify the exact product exposure in their environment and follow the Siemens remediation guidance.
- Vendor
- Siemens
- Product
- INTRALOG WMS
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-05-13
- Original CVE updated
- 2025-05-13
- Advisory published
- 2025-05-13
- Advisory updated
- 2025-05-13
Who should care
Siemens INTRALOG WMS operators, OT/IT administrators, and patch managers responsible for availability-critical deployments should review this advisory. Teams that need to reconcile the Microsoft-stack CVE description with the Siemens product mapping should also validate their affected installations.
Technical summary
The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, which indicates a remotely reachable denial-of-service condition that does not require authentication or user interaction and affects availability only. The source corpus does not provide exploit details, so remediation guidance is limited to the vendor fix: update Siemens INTRALOG WMS to V5 or later.
Defensive priority
High
Recommended defensive actions
- Identify Siemens INTRALOG WMS installations and confirm whether they match the affected product in the advisory.
- Apply the vendor remediation and update to V5 or later as directed by Siemens.
- Prioritize patching or mitigation for deployments exposed to untrusted networks because the issue is network-exploitable and unauthenticated.
- Monitor service availability and operational logs for unexpected interruption while remediation is being planned and applied.
- Use the official Siemens and CISA advisory links to confirm any environment-specific guidance or additional prerequisites.
Evidence notes
Evidence is drawn from the supplied CISA CSAF advisory ICSA-25-135-02, dated 2025-05-13, and the linked Siemens advisories. The record lists Siemens as the vendor, INTRALOG WMS as the affected product, a CVSS 3.1 vector of AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, and remediation to update to V5 or later. The source corpus does not include exploit proof, active exploitation, or KEV inclusion. The advisory title/description and the mapped affected product do not fully align, so product exposure should be validated against the official vendor advisory.
Official resources
-
CVE-2024-43483 CVE record
CVE.org
-
CVE-2024-43483 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in the supplied CISA CSAF advisory on 2025-05-13; not listed in KEV in the provided enrichment.